LCN WoNS 2005 Advance Program

08:30-08:45 Welcome and Introductions

08:45-09:35 Keynote Address


Dr. Rei Safavi-Naini, University of Wollongong, Australia

09:35-10:25 Session 1: Attack Mitigation

"AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN"
Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yin-Xin Jiang (Tsinghua University, China),
Xue-Hai Peng, Yang Wang, An-an Luo, Bin Zhu, Yao Ye, Feng-Yuan Ren (Tsinghua University, China)

"Automatic VPN Client Recovery from IPsec Pass-through Failures"
Jose' Brustoloni (University of Pittsburgh, USA)

10:25-10:45 Coffee break

10:45-12:00 Session 2: Architectures for Security

"An Efficient and Secure Peer-to-Peer Overlay Network"
Honghao Wang (University of Cincinnati, US),
Yingwu Zhu (University of Cincinnati, US),
Yiming Hu (University of Cincinnati, US)

"AAA Architecture for Mobile IP in Overlay Networks"
Zhen (Jane) Zhen (Dalhousie University, Canada),
Srinivas Sampalli (Dalhousie University, Canada)

"Architecture for Multi-Stage Network Attack Traceback"
Tim Strayer (BBN Technologies, USA),
Christine Jones (BBN Technologies, USA),
Beverly Schwartz (BBN Technologies, USA),
Joanne Mikkelson (BBN Technologies, USA),
Carl Livadas (BBN Technologies, USA)

12:00-13:10 Lunch

13:10-14:00 Keynote Address

To Be Announced

14:00-14:50 Session 3: Detection

"Filtering Shrew DDoS Attacks Using A New Frequency-Domain Approach"
Yu Chen (University of Southern California, USA),
Yu-Kwong Kwok (University of Hong Kong, Hong Kong),
Kai Hwang (Univ. of Southern California, USA)

"A Novel Tuneable Low-Intensity Adversarial Attack"
Salil Kanhere (University of New South Wales, Australia),
Anjum Naveed (University of New South Wales, Australia)

"Network-Based Detection of Passive Covert Channels in TCP/IP"
Eugene Tumoian (Taganrog State University of Radioengineering, Russia)

14:50-15:10 Break

15:10-16:25 Session 4: Privacy


"Client Controlled Security for Web Applications"
Marko Hassinen (University of Kuopio, Finland),
Petteri Mussalo (Intensium Oy, Finland)

"Secure Multimedia Streaming with Trusted Digital Rights Management"
Jizhong Zhao (Xi'an Jiaotong University, CN), 
Ma Zhaofeng(Tsinghua University, China), 
Yong Qi (Xi'an Jiaotong University, CN)

"DRKH: A Power Efficient Encryption Protocol for Wireless Devices"
Ahmad Kholaif (McMaster University, Canada),
Magda Fayek (Cairo University, Egypt),
Hoda Baraka (Cairo University, Egypt),
Hussein Eissa (National Research Centre, Egypt)